Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Mobile-200x125
  • News

Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack

December 12, 2019

We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which...

Read MoreRead more about Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
security-orchestration-command-soc-blog-1
  • News

Building a Culture of Security Awareness: How to Use Performance Metrics to Communicate SOC Effectiveness Throughout Your Org

December 12, 2019

It’s no secret that as the security landscape becomes increasingly complex, resources are becoming harder and harder to find. Team...

Read MoreRead more about Building a Culture of Security Awareness: How to Use Performance Metrics to Communicate SOC Effectiveness Throughout Your Org
internet-of-things-disclosure-childrens-gps-smart-watches
  • News

IoT Vuln Disclosure: Children’s GPS Smart Watches (R7-2019-57)

December 12, 2019

Executive summary As part of a recent IoT hacking training exercise, a number of Rapid7 penetration testers set out to...

Read MoreRead more about <div>IoT Vuln Disclosure: Children’s GPS Smart Watches (R7-2019-57)</div>
patches-2
  • News

Patch Tuesday – December 2019

December 12, 2019

Today we come to the end of 2019's monthly Microsoft Patch Tuesday (also known as Update Tuesday). This Christmas, Microsoft...

Read MoreRead more about Patch Tuesday – December 2019
rapid7-security-technology-secure-enviornment-vulnerability-risk-management
  • News

How to Actually Reduce Risk in Your Environment

December 12, 2019

What is a vulnerability risk management program? A vulnerability risk management program is imperative at any organization to secure assets,...

Read MoreRead more about How to Actually Reduce Risk in Your Environment
Copy-of-30-DAYS-OF-HAXMAS-19-
  • News

How I Shut Down a (Test) Factory with a Single Layer 2 Packet

December 12, 2019

At Rapid7 Labs we are always on the look for new research topics and fields to stick our fingers in...

Read MoreRead more about How I Shut Down a (Test) Factory with a Single Layer 2 Packet
osint
  • News

Ffuf – Fast Web Fuzzer Written In Go

December 12, 2019

A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz.FeaturesFast!Allows fuzzing of HTTP header values,...

Read MoreRead more about Ffuf – Fast Web Fuzzer Written In Go
malware
  • News

Fileintel – A Modular Python Application To Pull Intelligence About Malicious Files

December 12, 2019

This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular...

Read MoreRead more about Fileintel – A Modular Python Application To Pull Intelligence About Malicious Files
genact_9_cc
  • News

Genact – A Nonsense Activity Generator

December 12, 2019

Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with...

Read MoreRead more about Genact – A Nonsense Activity Generator
Ryuk
  • News

Anti-Virus Maker Discovers A Bug within Ryuk Ransomware

December 12, 2019

An antivirus maker discovered a bug in the decrypter application of the Ryuk Ransomware, the application "the Ryuk gang" basically...

Read MoreRead more about Anti-Virus Maker Discovers A Bug within Ryuk Ransomware
scamtext-255x300
  • News

Fake Elder Scrolls Online developers go phishing on PlayStation

December 12, 2019

A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via...

Read MoreRead more about Fake Elder Scrolls Online developers go phishing on PlayStation
osint
  • News

A week in security (December 2 – December 8)

December 12, 2019

Last week on Malwarebytes Labs, we took a look at a new version of the IcedID Trojan, described web skimmers...

Read MoreRead more about A week in security (December 2 – December 8)
osint
  • News

Please don’t buy this: smart doorbells

December 12, 2019

Though Black Friday and Cyber Monday are over, the two shopping holidays were just precursors to the larger Christmas season—a...

Read MoreRead more about Please don’t buy this: smart doorbells
forum_spam
  • News

Hundreds of counterfeit online shoe stores injected with credit card skimmer

December 12, 2019

There’s a well-worn saying in security: “If it’s too good to be true, then it probably isn’t.” This can easily...

Read MoreRead more about Hundreds of counterfeit online shoe stores injected with credit card skimmer
cyber-security-1805632_960_720-2
  • News

Attacks on IoT devices and WebApps on an extreme rise for the Q3

December 12, 2019

Ransomware threats and Malware numbers have fallen but are presently more active and dangerous. More than 7.2 Billion virus attacks...

Read MoreRead more about Attacks on IoT devices and WebApps on an extreme rise for the Q3
  • News

Pensacola City Hit by a Cyberattack After Deadly Shooting at Naval Air Station

December 12, 2019

The city of Pensacola, Florida was hit by a cyberattack that came in the wake of a deadly shooting at...

Read MoreRead more about Pensacola City Hit by a Cyberattack After Deadly Shooting at Naval Air Station
003-2
  • News

State of the Art Cyber-Security and Network Security a Top Priority for The Business Market

December 12, 2019

Reportedly, accepting the growing need for better cyber-security tactics and embracing a further developed regime for securing the businesses on...

Read MoreRead more about State of the Art Cyber-Security and Network Security a Top Priority for The Business Market
aerial-view-of-parking-lot-2402235-2
  • News

The Ministry of Communications of Russia has developed a new service for the sale of cars

December 12, 2019

According to Deputy head of the Ministry of Communications Maxim Parshin, the Ministry of Communications and the Ministry of Internal...

Read MoreRead more about The Ministry of Communications of Russia has developed a new service for the sale of cars
cyber2Bcrime-2
  • News

Hackers steal money from cards through the Uber and VTB applications

December 12, 2019

A resident of Russia Anna Kozlova, resting in Spain, lost 14 thousand rubles ($220). The money was stolen from her...

Read MoreRead more about Hackers steal money from cards through the Uber and VTB applications
image
  • News

Julian Assange arrested: WikiLeaks founder arrested in London

April 11, 2019

WikiLeaks founder Julian Assange has been arrested at the Ecuadorian embassy in London, Scotland Yard said. Home Secretary Sajid Javid...

Read MoreRead more about Julian Assange arrested: WikiLeaks founder arrested in London
Cisco
  • News

CVE-2019-1663 | Cisco Routers – Critical 9.8 CVSS Score

February 28, 2019

Cisco is warning businesses that use its wireless VPN and firewall routers to install updates immediately due to a critical...

Read MoreRead more about CVE-2019-1663 | Cisco Routers – Critical 9.8 CVSS Score
image
  • News

CVE-2019-1674 | New Elevation of Privilege Vulnerability Found in Cisco WebEx Meetings

February 28, 2019

A vulnerability found in the update service of the Cisco Webex Meetings Desktop App for Windows could allow an unprivileged local attacker...

Read MoreRead more about CVE-2019-1674 | New Elevation of Privilege Vulnerability Found in Cisco WebEx Meetings
image
  • News

Chrome Zero-Day Exploited to Harvest User Data via PDF Files

February 28, 2019

Exploit detection service EdgeSpot says it has spotted several PDF documents that exploit a zero-day vulnerability in Chrome to collect...

Read MoreRead more about Chrome Zero-Day Exploited to Harvest User Data via PDF Files
image
  • News

Government-funded researchers investigate vulnerabilities in EV charging stations

February 28, 2019

Charging stations for electric cars have sprung up across the country in recent years as hybrid vehicles continue to gain...

Read MoreRead more about Government-funded researchers investigate vulnerabilities in EV charging stations

Posts pagination

Previous 1 … 4,059 4,060 4,061 4,062 4,063 4,064 4,065 … 4,069 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 167[.]99[.]76[.]115:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 115[.]175[.]39[.]35:443

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]36[.]228[.]26:8080

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 166[.]108[.]200[.]194:443

May 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel